Trust and Identity In Virtual Worlds and Collaborative Spaces Anthony Nadalin, Distinguished Engineer, IBM
Early Virtual Worlds & Collaborative Spaces Business Applications Commerce Collaboration and Events Education  and Training Emerging  Business  Applications
Trust and identity in Virtual worlds and collaborative spaces Think:  Wikipedia ,  Second Life International:  open to everybody with access to the Internet Collaborative:  free information sharing, user-created content Social:  users can establish relationships with other users Everybody can participate – and bad guys can act anonymously Unclear basis for trust in the information you find in Wikipedia Insufficient accountability for inappropriate content in virtual worlds We are in the early days of commercial exploitation of these technologies Resembling situation with electronic mail and spam 10 years ago Trust and identity are key to the success of collaborative space – either way Issues around trust threaten the continued success of collaborative spaces Sound trust and easy to use federated identities enable new services
Some examples of issues around trust and identity Online Predators:  http://www.cbsnews.com/stories/2007/03/13/tech/main2563414.shtml “…  one of a half-dozen documented cases this past year alone in which older men used such Internet sites to set up sexual encounters with minor girls in Connecticut." Illegal Content/Behavior:  http://www.theregister.co.uk/2007/02/21/dutch_demand_ban_on_virtual_child_porn/ "... reports about adult players with child avatars soliciting (paid) sex." Online Harressment and Bullying:  http://doc.weblogs.com/2007/03/28#whatItIsnt "... abruptly cancelled her appearance at the O'Reilly ETech conference in San Diego, after receiving threatening and sexually graphic messages that made her afraid to leave her house." Reputation Fraud:  http://www.msnbc.msn.com/id/17171372/ "... eBay suspended accounts identified in the article, ... the forger merely moved the operation to another Internet auction site for a few months before returning to eBay, setting up new accounts and picking up where he left off." False Claims:  http://en.wikipedia.org/wiki/Essjay_controversy "... claimed to hold doctoral degrees in theology and canon law as a tenured professor at a private university, he was in fact a community college dropout from Kentucky."
Collaborative spaces and virtual communities * MMOG = Massive Multiplayer Online Game   Multi-service Platforms Social Computing 3D/Realtime Internet/MMOGs Common problem: Trust and Identity Enterprise Customers & Governments
What is new, compared to 10 years ago? History Public key infrastructure (X509v3, SPKI, PGP, …), digital signature initiatives – late 90’s Microsoft Passport (= Windows Live ID) – 2000 Liberty Alliance – 2001 What changed? Awareness for the role of  digital identity Post-9/11 security concerns High-profile privacy incidents – e.g., TJX: lost 45.7 million payment card numbers Identity theft – 3.7% of all US citizens were victims of fraud due to identity theft More valuable data online, e.g., healthcare portals Value Increasing value of  identity  per se: more and better services Increasing value of  portable  identity: Web 2.0 connects people and data across enterprise boundaries Increasing demand for  user-centric ,  portable ,  life-long  identity, and  reputation Increasing demand for  strong   identity
Scenarios 1. Trusted Content 2. Trusted Collaboration 3. Trusted Roaming 4. Trusted Delegation 5. Trusted Aggregation
Scenario 1: Trusted Content Can I trust this  collaborative space ? Is all content correct? Is all content authorized? Is all content appropriate for me? What is the creator’s reputation? Can I trust this  content ? Is this content correct? Is this content authorized? Is this content appropriate for me? What is the creator’s reputation?
Scenario 2: Trusted Collaboration [email_address] [email_address] Request freetime How can Patrick locate Paul’s calendar? Can Paul trust this  request ? Is this request legitimate? Who is this requestor? Patrick Paul
Scenario 3: Trusted Roaming I want to see what World of Warcraft is about I want to stand in SL look over the bridge into WoW I want to go from “left” to “right” And both with a minimum of overhead – no new registration, no new avatar design, no new reputation I do have an avatar in Second Life
Scenario 4: Trusted Delegation Give Alice the right to see Bob’s images How can Bob trust that only Alice sees the pictures, and how can he maintain control over the pictures? How can Bob avoid telling the service who Alice is?
Scenario 5: Trusted Aggregation Bank Health Insur. Employer Aggregator
Scenarios Interoperability of trust and identity systems User-centricity, transparency, choice Privacy and pseudonymity Reputation of users and spaces  Cross-platform capability Specific Scenario 1. Trusted Content Trust in correctness and appropriateness of specific / of all objects in a collaborative space (e.g., Wikipedia, Second Life). 2. Trusted Collaboration Enable freetime-based scheduling of meetings across calendars in different enterprises, using different identity schemes. 3. Trusted Roaming Cross bridges from one virtual world to the other, carrying your identity (avatar, attributes, reputation) with you 4. Trusted Delegation Give your friend access to your digital photos without the fear that the photo server knows who your friends are, or that your friends share your photos with others. 5. Trusted Aggregation Aggregate personal information through a portal, without fear of misuse or fear of identity theft, but with the added value of non-trivial aggregation.
State of the Art
Some Remarks on Policy Identity Online identities are essentially unregulated Risk associated with using online identities is growing, number of high profile incidents will increase Identity theft, e-banking, healthcare portals, reputation on eBay, … Needed: best practices for trust and identity Privacy Privacy is a top concern for individuals Similar privacy concerns and privacy regulations exist world-wide Current privacy principles (OECD) seemingly collide with Web 2.0 paradigm: minimize vs. maximize info sharing Needed: new societal norms and best practices
Identity Technology Status quo Site-specific username / password Low security, vulnerable to phishing, password management up to user Application-specific identity Sharing of identity information only within defined federations Trends User-centric identity User controls release of identities and attributes Decoupling of user’s from service provider’s view Framework provides unified, abstract view on a multitude of specific identity systems Security beyond username / password Username / password    tokens containing identity claims Framework approach enables strong mutual client-server authentication Federated identity, portable identity in Web 2.0 Lightweight, decentralized identity provider for single sign-on Fine-grained, user-controlled attribute sharing with privacy
Reputation Technology Summary of actual past behavior, by service provider Real identity Background check against external data Peer reviews portable specific Identity Verification, Identity Proofing = Strong Identity Trust in specific attribute or future behavior?  Digital Identity
Outlook
3. Future of  Virtual Reality 4. Future of Identity Systems User-centric, transparent identity management Service-specific identities are managed transparently User can create as many identities as he or she wishes User maintains full control over his or her privacy (e.g., pseudonyms) Access to identities is secured through strong authentication Privacy friendly service discovery and search will emerge Portable identities Immersive user interfaces yield rich identities and complex attributes and capabilities Users expect to carry their rich identities from one space (application) to the next 2 . Future of Identity Life-long personal identities People act as “free agents” who manage their digital identities and capabilities independently of their current “employers” or “schools” Identities and attributes become independent from identity providers, and can be freely moved between providers Some will stay for a user’s whole life, and need special protection 1. Future of Identification Strong identity proofing Biometrics increasingly used to prove and authenticate identities Online identity increasingly established through physical world identities Technology Outlook BBC 2007 On average: 20 20% growth/year    IBM GIO 2006
An   eComm 2008   presentation –   http://eCommMedia.com   for more

More Related Content

PPTX
Age verification in real time keeping children safe online biometric solution
PDF
History of Identity in Computers
PDF
My Identiverse: The Evolution of Digital Identity and Openness
PPTX
NET 303: Online Policy Primer
PPT
Legal Implications Of Social Media
PDF
Identity 101: Boot Camp for Identity North 2016
PPT
The Legal Implications of Social Media
PDF
Domains of Identity
Age verification in real time keeping children safe online biometric solution
History of Identity in Computers
My Identiverse: The Evolution of Digital Identity and Openness
NET 303: Online Policy Primer
Legal Implications Of Social Media
Identity 101: Boot Camp for Identity North 2016
The Legal Implications of Social Media
Domains of Identity

What's hot (20)

PDF
Social Media Privacy Laws and Legal Liabilities
PPTX
Social Media Law: The Legal Do's and Don'ts of Social Media
PPTX
Social Media and Estate Planning presented to Wayne State University Law Scho...
PPTX
Disadvantages of Digital Identity
PDF
BeenVerified Berkman Submission
PPT
Social Media and Intellectual Property
PDF
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
PDF
Web 3.0 and What It Means to Marketing
PDF
The Domains of Identity & Self-Sovereign Identity MyData 2018
PPTX
issue and trend in integrative media
PPTX
Your digital identity - are you feeling lucky?
PDF
Noah Lang's Presentation
PPTX
Amie- Unit 1 P6 and M2
PDF
NII Social Engineering Case Study
PDF
Ecosystem map Prototype & Future Vision
PDF
Digital magna carta privacy rights
PPTX
Social Networking (Ethics in Information Technology)
DOCX
Token or no token-2,000 word arti cle
PPTX
website, browser,Domain name, Email, Social networks,Ecommerce
Social Media Privacy Laws and Legal Liabilities
Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media and Estate Planning presented to Wayne State University Law Scho...
Disadvantages of Digital Identity
BeenVerified Berkman Submission
Social Media and Intellectual Property
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Web 3.0 and What It Means to Marketing
The Domains of Identity & Self-Sovereign Identity MyData 2018
issue and trend in integrative media
Your digital identity - are you feeling lucky?
Noah Lang's Presentation
Amie- Unit 1 P6 and M2
NII Social Engineering Case Study
Ecosystem map Prototype & Future Vision
Digital magna carta privacy rights
Social Networking (Ethics in Information Technology)
Token or no token-2,000 word arti cle
website, browser,Domain name, Email, Social networks,Ecommerce
Ad

Viewers also liked (18)

PPTX
10 rosemary benefits
PPT
Social media for the pragmatic student
PPT
The Social Life of Second Life: An analysis of the networks of a virtual world
PPTX
Internet .ppt
PPT
Global Virtual Teams Teigland
PDF
Social networking learnings & opportunities web innovation conference, bangal...
PPT
Sacred Secrets Meet Cyberspace Privacy Issues for Consumers
PPT
Trusting The Trust
PPTX
virtual team
PPTX
Building trust in virtual teams -Change Management Institute
PPTX
Tok final ppt internet reliabiity
PPTX
Building trust in virtual teams March 2014
PPT
Strangers as constructive trustee
PPTX
The speed of trust
PPTX
Dynamics Of Trust
PPT
The Speed Of Trust
PDF
How To Build Trust In A Relationship – Interpersonal Skills
PDF
BUILDING TRUST IN A VIRTUAL TEAM: A CONCEPTUAL FRAMEWORK
10 rosemary benefits
Social media for the pragmatic student
The Social Life of Second Life: An analysis of the networks of a virtual world
Internet .ppt
Global Virtual Teams Teigland
Social networking learnings & opportunities web innovation conference, bangal...
Sacred Secrets Meet Cyberspace Privacy Issues for Consumers
Trusting The Trust
virtual team
Building trust in virtual teams -Change Management Institute
Tok final ppt internet reliabiity
Building trust in virtual teams March 2014
Strangers as constructive trustee
The speed of trust
Dynamics Of Trust
The Speed Of Trust
How To Build Trust In A Relationship – Interpersonal Skills
BUILDING TRUST IN A VIRTUAL TEAM: A CONCEPTUAL FRAMEWORK
Ad

Similar to Tony Nadalin' presentation at eComm 2008 (20)

PDF
Self-Sovereign Identity: Lightening Talk at RightsCon
PPT
How to study trust online
PDF
Self-Sovereign Identity for the Decentralized Web Summit
PPTX
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
PPT
Openid
PPTX
laudon-traver-ec17-ppt-ch05-accessible-dg-revised-hw1z.pptx
PPTX
laudon-traver-ec17-ppt-ch05-accessible-dg-revised-hw1z.pptx
PDF
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
PDF
Verifiable Credentials in Self-Sovereign Identity (SSI)
PPTX
Social Computing – The Promise And The Perils Final
PDF
The Open, Social Web Workshop
PPTX
Blockchain Possibilities: Identity, Privacy, and Advertising
PPTX
AIIM New England Social Networking Presentation
PDF
Identity Talk at Net Squared 2008
DOCX
LD7028 Research Methods And Project Management.docx
PDF
Online Fraud Detection- A Review
PDF
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
PPTX
Identity Management for Web Application Developers
PPTX
Designing for Privacy NY Studio—10/04/21
Self-Sovereign Identity: Lightening Talk at RightsCon
How to study trust online
Self-Sovereign Identity for the Decentralized Web Summit
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
Openid
laudon-traver-ec17-ppt-ch05-accessible-dg-revised-hw1z.pptx
laudon-traver-ec17-ppt-ch05-accessible-dg-revised-hw1z.pptx
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Verifiable Credentials in Self-Sovereign Identity (SSI)
Social Computing – The Promise And The Perils Final
The Open, Social Web Workshop
Blockchain Possibilities: Identity, Privacy, and Advertising
AIIM New England Social Networking Presentation
Identity Talk at Net Squared 2008
LD7028 Research Methods And Project Management.docx
Online Fraud Detection- A Review
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity Management for Web Application Developers
Designing for Privacy NY Studio—10/04/21

More from eComm2008 (20)

PDF
David Recordon's Presentation at eComm 2008
PDF
Dave Troy's Presentation at eComm 2008
PDF
eComm 2008 Programme Guide
PPT
Anders Carlius's presentation at eComm 2008
PPT
Sean O\'Sullivan\'s presentation at eComm 2008
PDF
Norman Lewis\'s presentation at eComm 2008
PPT
Sheldon Renan's presentation at eComm 2008
PPT
Brough Turner\'s presentation at eComm 2008
PDF
Brian Capouch's presentation at eComm 2008
PPT
Fabrizio Capobianco's presentation at eComm 2008
PPT
Shirish Andhare's presentation at eComm 2008
PPT
Gary Miner's presentation at eComm 2008
PPT
Trevor Baca's presentation at eComm 2008
PPT
Jan Macek's presentation at eComm 2008
PPT
Martin Geddes's presentation at eComm 2008
PPT
Michel Bauwens's presentation at eComm 2008
PPT
Nathan Eagle's presentation at eComm 2008
PPT
Stanley Chia's presentation at eComm 2008
PPT
Rocky Nevin's presentation at eComm 2008
PPT
Phil Wolff's 's presentation at eComm 2008
David Recordon's Presentation at eComm 2008
Dave Troy's Presentation at eComm 2008
eComm 2008 Programme Guide
Anders Carlius's presentation at eComm 2008
Sean O\'Sullivan\'s presentation at eComm 2008
Norman Lewis\'s presentation at eComm 2008
Sheldon Renan's presentation at eComm 2008
Brough Turner\'s presentation at eComm 2008
Brian Capouch's presentation at eComm 2008
Fabrizio Capobianco's presentation at eComm 2008
Shirish Andhare's presentation at eComm 2008
Gary Miner's presentation at eComm 2008
Trevor Baca's presentation at eComm 2008
Jan Macek's presentation at eComm 2008
Martin Geddes's presentation at eComm 2008
Michel Bauwens's presentation at eComm 2008
Nathan Eagle's presentation at eComm 2008
Stanley Chia's presentation at eComm 2008
Rocky Nevin's presentation at eComm 2008
Phil Wolff's 's presentation at eComm 2008

Recently uploaded (20)

PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PPTX
future_of_ai_comprehensive_20250822032121.pptx
PDF
4 layer Arch & Reference Arch of IoT.pdf
PPTX
Microsoft User Copilot Training Slide Deck
PDF
SaaS reusability assessment using machine learning techniques
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
Enhancing plagiarism detection using data pre-processing and machine learning...
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
LMS bot: enhanced learning management systems for improved student learning e...
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
Lung cancer patients survival prediction using outlier detection and optimize...
Improvisation in detection of pomegranate leaf disease using transfer learni...
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
future_of_ai_comprehensive_20250822032121.pptx
4 layer Arch & Reference Arch of IoT.pdf
Microsoft User Copilot Training Slide Deck
SaaS reusability assessment using machine learning techniques
sbt 2.0: go big (Scala Days 2025 edition)
Advancing precision in air quality forecasting through machine learning integ...
Auditboard EB SOX Playbook 2023 edition.
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
giants, standing on the shoulders of - by Daniel Stenberg
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf

Tony Nadalin' presentation at eComm 2008

  • 1. Trust and Identity In Virtual Worlds and Collaborative Spaces Anthony Nadalin, Distinguished Engineer, IBM
  • 2. Early Virtual Worlds & Collaborative Spaces Business Applications Commerce Collaboration and Events Education and Training Emerging Business Applications
  • 3. Trust and identity in Virtual worlds and collaborative spaces Think: Wikipedia , Second Life International: open to everybody with access to the Internet Collaborative: free information sharing, user-created content Social: users can establish relationships with other users Everybody can participate – and bad guys can act anonymously Unclear basis for trust in the information you find in Wikipedia Insufficient accountability for inappropriate content in virtual worlds We are in the early days of commercial exploitation of these technologies Resembling situation with electronic mail and spam 10 years ago Trust and identity are key to the success of collaborative space – either way Issues around trust threaten the continued success of collaborative spaces Sound trust and easy to use federated identities enable new services
  • 4. Some examples of issues around trust and identity Online Predators: http://www.cbsnews.com/stories/2007/03/13/tech/main2563414.shtml “… one of a half-dozen documented cases this past year alone in which older men used such Internet sites to set up sexual encounters with minor girls in Connecticut." Illegal Content/Behavior: http://www.theregister.co.uk/2007/02/21/dutch_demand_ban_on_virtual_child_porn/ "... reports about adult players with child avatars soliciting (paid) sex." Online Harressment and Bullying: http://doc.weblogs.com/2007/03/28#whatItIsnt "... abruptly cancelled her appearance at the O'Reilly ETech conference in San Diego, after receiving threatening and sexually graphic messages that made her afraid to leave her house." Reputation Fraud: http://www.msnbc.msn.com/id/17171372/ "... eBay suspended accounts identified in the article, ... the forger merely moved the operation to another Internet auction site for a few months before returning to eBay, setting up new accounts and picking up where he left off." False Claims: http://en.wikipedia.org/wiki/Essjay_controversy "... claimed to hold doctoral degrees in theology and canon law as a tenured professor at a private university, he was in fact a community college dropout from Kentucky."
  • 5. Collaborative spaces and virtual communities * MMOG = Massive Multiplayer Online Game   Multi-service Platforms Social Computing 3D/Realtime Internet/MMOGs Common problem: Trust and Identity Enterprise Customers & Governments
  • 6. What is new, compared to 10 years ago? History Public key infrastructure (X509v3, SPKI, PGP, …), digital signature initiatives – late 90’s Microsoft Passport (= Windows Live ID) – 2000 Liberty Alliance – 2001 What changed? Awareness for the role of digital identity Post-9/11 security concerns High-profile privacy incidents – e.g., TJX: lost 45.7 million payment card numbers Identity theft – 3.7% of all US citizens were victims of fraud due to identity theft More valuable data online, e.g., healthcare portals Value Increasing value of identity per se: more and better services Increasing value of portable identity: Web 2.0 connects people and data across enterprise boundaries Increasing demand for user-centric , portable , life-long identity, and reputation Increasing demand for strong identity
  • 7. Scenarios 1. Trusted Content 2. Trusted Collaboration 3. Trusted Roaming 4. Trusted Delegation 5. Trusted Aggregation
  • 8. Scenario 1: Trusted Content Can I trust this collaborative space ? Is all content correct? Is all content authorized? Is all content appropriate for me? What is the creator’s reputation? Can I trust this content ? Is this content correct? Is this content authorized? Is this content appropriate for me? What is the creator’s reputation?
  • 9. Scenario 2: Trusted Collaboration [email_address] [email_address] Request freetime How can Patrick locate Paul’s calendar? Can Paul trust this request ? Is this request legitimate? Who is this requestor? Patrick Paul
  • 10. Scenario 3: Trusted Roaming I want to see what World of Warcraft is about I want to stand in SL look over the bridge into WoW I want to go from “left” to “right” And both with a minimum of overhead – no new registration, no new avatar design, no new reputation I do have an avatar in Second Life
  • 11. Scenario 4: Trusted Delegation Give Alice the right to see Bob’s images How can Bob trust that only Alice sees the pictures, and how can he maintain control over the pictures? How can Bob avoid telling the service who Alice is?
  • 12. Scenario 5: Trusted Aggregation Bank Health Insur. Employer Aggregator
  • 13. Scenarios Interoperability of trust and identity systems User-centricity, transparency, choice Privacy and pseudonymity Reputation of users and spaces Cross-platform capability Specific Scenario 1. Trusted Content Trust in correctness and appropriateness of specific / of all objects in a collaborative space (e.g., Wikipedia, Second Life). 2. Trusted Collaboration Enable freetime-based scheduling of meetings across calendars in different enterprises, using different identity schemes. 3. Trusted Roaming Cross bridges from one virtual world to the other, carrying your identity (avatar, attributes, reputation) with you 4. Trusted Delegation Give your friend access to your digital photos without the fear that the photo server knows who your friends are, or that your friends share your photos with others. 5. Trusted Aggregation Aggregate personal information through a portal, without fear of misuse or fear of identity theft, but with the added value of non-trivial aggregation.
  • 15. Some Remarks on Policy Identity Online identities are essentially unregulated Risk associated with using online identities is growing, number of high profile incidents will increase Identity theft, e-banking, healthcare portals, reputation on eBay, … Needed: best practices for trust and identity Privacy Privacy is a top concern for individuals Similar privacy concerns and privacy regulations exist world-wide Current privacy principles (OECD) seemingly collide with Web 2.0 paradigm: minimize vs. maximize info sharing Needed: new societal norms and best practices
  • 16. Identity Technology Status quo Site-specific username / password Low security, vulnerable to phishing, password management up to user Application-specific identity Sharing of identity information only within defined federations Trends User-centric identity User controls release of identities and attributes Decoupling of user’s from service provider’s view Framework provides unified, abstract view on a multitude of specific identity systems Security beyond username / password Username / password  tokens containing identity claims Framework approach enables strong mutual client-server authentication Federated identity, portable identity in Web 2.0 Lightweight, decentralized identity provider for single sign-on Fine-grained, user-controlled attribute sharing with privacy
  • 17. Reputation Technology Summary of actual past behavior, by service provider Real identity Background check against external data Peer reviews portable specific Identity Verification, Identity Proofing = Strong Identity Trust in specific attribute or future behavior?  Digital Identity
  • 19. 3. Future of Virtual Reality 4. Future of Identity Systems User-centric, transparent identity management Service-specific identities are managed transparently User can create as many identities as he or she wishes User maintains full control over his or her privacy (e.g., pseudonyms) Access to identities is secured through strong authentication Privacy friendly service discovery and search will emerge Portable identities Immersive user interfaces yield rich identities and complex attributes and capabilities Users expect to carry their rich identities from one space (application) to the next 2 . Future of Identity Life-long personal identities People act as “free agents” who manage their digital identities and capabilities independently of their current “employers” or “schools” Identities and attributes become independent from identity providers, and can be freely moved between providers Some will stay for a user’s whole life, and need special protection 1. Future of Identification Strong identity proofing Biometrics increasingly used to prove and authenticate identities Online identity increasingly established through physical world identities Technology Outlook BBC 2007 On average: 20 20% growth/year  IBM GIO 2006
  • 20. An eComm 2008 presentation – http://eCommMedia.com for more